HTTP Parameter Pollution
HTTP Parameter Pollution (HPP) is a type of web application vulnerability that affects the security of the web applications. It
Learn ethical hacking , networking, social engineering, cyber security, pen-testing, linux, android, windows tricks.
HTTP Parameter Pollution (HPP) is a type of web application vulnerability that affects the security of the web applications. It
GraphQL is a modern and flexible query language for APIs, but with the increased usage of GraphQL, the risk of
File Inclusion is a type of vulnerability in web applications that allows an attacker to include or execute a remote
Directory traversal, also known as path traversal, is a type of vulnerability that allows an attacker to access files and
In today’s connected world, the availability and reliability of online services are critical for both individuals and businesses. However, these
Installing Wireless Network Adapter on Kali Linux: Kali Linux is a popular distribution for ethical hacking and penetration testing. In
In the world of cybersecurity, trapping hackers can be a valuable tool for organizations looking to better understand the tactics
In today’s digital world, we rely on the internet for a variety of activities, from online banking to shopping and
A domain name is a unique name that is used to identify a website on the internet. It’s like an
DNS rebinding is a technique used by attackers to gain unauthorized access to a target device or network by manipulating
CSV Injection, also known as formula injection, occurs when a malicious actor is able to inject a formula or malicious
Keyloggers are programs or hardware devices that track a keyboard’s activities (keys pressed). Keyloggers are spyware where users are unaware
List of Best Hacker-Friendly Search Engines General Search Engines Google Bing Yahoo! Yandex Ask Baidu You Servers Shodan – Search Engine
In this post, we will show you how to find the email address for most GitHub profiles (even if they
The WebSocket API is an advanced technology that makes it possible to open a two-way interactive communication session between the
A reverse shell is a type of session cyber attackers commonly use to open communication ports between their machines and the victims
The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows
Proxychains is a UNIX program that allows us to mask our IP address by redirecting network traffic. It routes our
if you don’t already have Kali Linux you can download it here. If you are using an alternative Linux distribution
Features -> Create a hidden service -> Generate non-staged payload (python/meterpreter_reverse_http) -> Convert url using Tor2Web: a final extension .ws
Running a business can be very rewarding, but there are also lots of challenges that you have to overcome if
A way of hiding messages in messages, Use Zero-Width Characters to Hide Secret Messages in Text Zero-width characters are non-printing
Nmap is one of the most commonly used tools by ethical hackers. Its ease of use and clean installation along with
Have you ever wondered how cool it would be to have your own A.I. assistant? Imagine how easier it would
A zero-day vulnerability, at its core, is a flaw. It is an unknown exploit in the wild that exposes a
It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes. The obfuscated
There may come a time where you have an extra wireless router on your hands (such as the Linksys WRT54GL) that
There are a lot of attacks that can be performed to a server when it’s not correctly configured or doesn’t
HULK is a Denial of Service (DoS) tool used to attack web servers by generating unique and obfuscated traffic volumes.
Hydra is a pre-installed tool in Kali Linux used to brute-force username and password to different services such as ftp,
DDoS stands for Distributed Denial of Service. This is a cyber-attack in which the attacker floods the victim’s servers with
I F T T T is short for If This Then That. Using IFTTT you can easily automate WordPress to
We are going to show you how to make a persistent backdoor. Once you exploit some android device just do
Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies,
Without admin privileges, installing additional software, or modifying the Windows 10 firewall, an attacker can alter a router and perform
The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be
Having an efficient workflow is an integral part of any craft, but it’s especially important when it comes to probing
Nikto is a free software command-line vulnerability scanner that scans webservers for dangerous files/CGIs, outdated server software and other problems.
Learn Termux for hacking !! first, understand what is Termux and follow how to install applications using Termux and the complete Termux command. In this article, I